ESORICS 2019 - CALL FOR POSTERS (Poster Session)

June 26, 2019

The European Symposium on Research in Computer Security (ESORICS) 2019 will be held in Luxembourg from 23 to 25 September. For the first time, this year ESORICS will include a poster session on the evening of September 23. The poster session is ideal to share preliminary or established research and to spark discussion. Poster presenters will enjoy a multi-hour session to describe their work and get feedback from attendees.

Submission deadline: August 1
Author notification: August 15

Authors are asked to submit a 2-page abstract in LNCS format that describes the main contributions of the poster. Proposals should emphasize the motivation for the work and summarize the results being presented.
The abstracts must not be anonymous, and must contain the authors' names, affiliations, and contact information. The title must begin with the keyword “POSTER:”. Submissions that are not formatted as described above risk rejection without review. At least one presenter per accepted poster must attend the conference. The poster should be submitted by email to posters-esorics2019 [at] uni [dot] lu
The participants will have to print and bring the posters themselves and these will not appear in the proceedings.


  • Gunes Acar, Princeton University
  • Josep Balasch, KU Leuven
  • Kovila Coopamootoo, Newcastle University
  • Constantin Catalin Dragan, University of Surrey
  • Chloe R. Martindale, Eindhoven University of Technology
  • Mustafa A. Mustafa, University of Manchester
  • Alfredo Rial, University of Luxembourg
  • Daniele Sgandurra, Royal Holloway - University of London

Alfredo Rial, University of Luxembourg


posters-esorics2019 [at] uni [dot] lu


Topics of interest include, but are not limited to

  • Access control
  • Accountability
  • Ad hoc networks
  • Anonymity
  • Applied cryptography
  • Authentication
  • Biometrics
  • Blockchain and finance security
  • Data and computation integrity
  • Database security
  • Data protection
  • Deep learning for attack and defense
  • Digital content protection
  • Digital forensics
  • Distributed systems security
  • Embedded systems security
  • Inference control
  • Information hiding
  • Identity management
  • Information flow control
  • Information security governance and management
  • Intrusion detection
  • Formal security methods
  • Language-based security
  • Network security
  • Phishing and spam prevention
  • Privacy
  • Privacy preserving data mining
  • Risk analysis and management
  • Secure electronic voting
  • Security architectures
  • Security economics
  • Security metrics
  • Security models
  • Security and privacy for big data
  • Security and privacy in cloud scenarios
  • Security and privacy in complex systems
  • Security and privacy in content centric networking
  • Security and privacy in crowdsourcing
  • Security and privacy in the IoT
  • Security and privacy in location services
  • Security and privacy for mobile code
  • Security and privacy in pervasive / ubiquitous computing
  • Security and privacy policies
  • Security and privacy in social networks
  • Security and privacy in web services
  • Security and privacy in cyber-physical systems
  • Security, privacy and resilience in critical infrastructures
  • Security verification
  • Software security
  • Systems security
  • Trust models and management
  • Trustworthy user devices
  • Usable security and privacy
  • Web security
  • Wireless security
View National Cybersecurity Edcuation Agenda